Sciweavers

1993 search results - page 340 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
14 years 7 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 7 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...
BMCBI
2008
121views more  BMCBI 2008»
14 years 10 months ago
GeneTrailExpress: a web-based pipeline for the statistical evaluation of microarray experiments
Background: High-throughput methods that allow for measuring the expression of thousands of genes or proteins simultaneously have opened new avenues for studying biochemical proce...
Andreas Keller, Christina Backes, Maher Al-Awadhi,...
TSE
1998
129views more  TSE 1998»
14 years 9 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet
PLDI
1994
ACM
15 years 1 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar